CCTV CODE OF PRACTICE

Size: px
Start display at page:

Download "CCTV CODE OF PRACTICE"

Transcription

1 CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City, Clifton or Brackenhurst Campuses. Data Subjects means an individual who is a subject of personal data. NTU and the University both mean Nottingham Trent University. Security Manager shall mean, for the purposes of this policy, the member of staff with specific responsibility for management and control of the University s CCTV systems or his/her nominee. System means the University s CCTV Surveillance System including CCTV cameras. Contents 1. Introduction 2. Operation of the University s CCTV Surveillance System 3. Monitoring of CCTV Images 4. Recording of Images and Access 5. Complaints 6. Other Supporting Documents 7. Governance 1. Introduction 1.1 The University has installed a comprehensive CCTV surveillance system across all three campuses for the principal purposes of preventing and detecting crime. The images from the CCTV system can be monitored in the control rooms at each campus, which are staffed by the University s Security Department. It is recognised that ancillary benefits of operating CCTV for this purpose may include reduction of the fear of crime generally and the provision of a safer public environment for the benefit of those who live or work within and visit the University. 1.2 CCTV Cameras which are located within individual buildings are capable of being monitored by the Reception Officers of those buildings. If the Security Manager considers that the security of a College/School or Professional Services Department whose areas the cameras are designed to protect would be improved by allowing designated staff within that area to monitor the images, then relevant staff will be authorised to view the images. CCTV images monitored by Reception Officers will show live images only and will not include external cameras or give access to archived images 1.3 The University s CCTV surveillance system has been installed and is monitored in line with the following objectives:

2 To assist in the prevention and detection of crime; To facilitate the identification, apprehension and prosecution of offenders in relation to crime and public order; To aid public safety; and To assist with the management of the University s car parks. To assist Student and Staff Support Services in connection with disciplinary procedures in cases of serious misconduct; and To assist in room utilisation surveys. 1.4 Due to public concern surrounding a surveillance society, the use of CCTV surveillance must be consistent with respect for individuals privacy and due to this concern other methods of achieving the objectives of a CCTV surveillance system will be considered before installation of any CCTV camera on the University campuses. 1.5 This Code of Practice has been prepared for the guidance of University staff and students. Its purpose is to ensure that the CCTV system is used to create a safer environment for staff, students and visitors to the University and to ensure that its operation is consistent with the obligations on the University imposed by the Data Protection Act 1998, Article 8 of the Human Rights 1998 and The Security Industry Authority. For the purposes of the Data Protection Act 1998, the Data Controller is Nottingham Trent University. 2. Operation of the University s CCTV Surveillance System The System 2.1 The system is operational and images are capable of being monitored for twenty-four hours a day throughout the whole year. 2.2 The public and University community are made aware of the presence of the system by appropriate signage which sets out the purposes for processing the CCTV images and identifies the University as the party responsible for processing those images. 2.3 To ensure privacy, wherever practicable, the CCTV cameras are prevented from focusing or dwelling on domestic accommodation. Where domestic areas such as gardens abut those areas which are intended to be covered by the scheme, the Security Manager will consult with the owners of the domestic area to discuss what images may be recorded. Where it is not practicable to prevent the cameras from focusing or dwelling on such areas or where domestic areas abut the areas which are intended to covered, appropriate training will be given to system operators to ensure that they are made aware that they should not be monitoring such areas. 2.4 Images captured by cameras will be recorded on equipment located securely within University buildings. All security control rooms will have monitoring equipment which will allow control room officers to monitor live images from the cameras, any transfer of images onto other media will only take place within the City Control room in line with this Code of Practice. 2.5 Although every reasonable effort has been made in the planning and design of the CCTV system to give it maximum effectiveness, it is not possible to guarantee that the system will detect every incident taking place within the areas of coverage.

3 Control Rooms 2.6 Images captured by the system will be monitored in the self-contained and secure Control Rooms. CCTV cameras monitored by Reception Officers show live images only. 2.7 Access to Control Rooms is strictly limited to the Duty Controllers, authorised staff members and Senior Management. Police Officers may enter with the explicit consent of the Security Manager. Other persons may be authorised to enter the Control Room on a case-by-case basis with the explicit consent of the Security Manager with each visit being supervised at all times. 2.8 In an emergency, and where it is not reasonably practicable to secure prior authorisation, access may be granted to persons with a legitimate reason to enter the Control Room. Before access is granted to any person, the Security Manager must be satisfied with the identity of any visitor. 2.9 All visitors will be required to complete and sign a visitors log which will be kept in the Control Room An incident log will be maintained in the Control Room with full details of security incidents including those captured on CCTV which are transferred to another medium, together with any consequential action taken Handling of images and information within the Control Rooms will be done in accordance with this Code of Practice and the Data Protection Act The Security Manager will be responsible for compliance with section above and for the development of working procedures within the control room to ensure such compliance. 3. Monitoring of CCTV Images 3.1 The Security Manager will ensure that all staff (including relief/temporary staff) are fully briefed and trained in respect to all functions, both operational and administrative, arising within the operation of CCTV surveillance including training in the requirements of this Code of Practice and the Data Protection Act The control of the CCTV Surveillance System will always remain with the University. However, at the Security Manager s discretion, the cameras may be operated in accordance with requests made by the police during an incident to monitor potential public disorder, assist in the detection of crime or facilitate the apprehension and prosecution of offenders in relation to crime and public order. On each occasion the Police are assisted with their operations, a report setting out the time, date and detail of the incident will be submitted to the Security Manager. 3.3 CCTV images which evidence any behaviour, which cannot reasonably be ignored, may be used for staff and student disciplinary purposes. Covert Monitoring 3.4 Covert monitoring will only be considered in exceptional circumstances. Deployment will be subject to the completion of an impact assessment 1, in line with Part 3 of the ICO s Data Protection, Employment Practices Code and approval 1 The impact assessment should be completed by the manager appointed to investigate the alleged misconduct.

4 by both the Security Manager and the Director of Human Resources or PVC for Student Affairs, in the case of students. 3.5 Circumstances where covert monitoring may be considered include; where there are grounds for suspecting criminal activity or equivalent malpractice, where notifying the individuals about the monitoring would prejudice its prevention or detection. 3.6 Where covert monitoring is approved, it must be strictly targeted at obtaining evidence within a set timeframe and must cease once the investigation is complete. 3.7 Images recorded of individuals not under suspicion will be deleted. 4. Recording of Images and Access Control and Management of Recordings 4.1 All recording media used for the monitoring and capture of images on the University s CCTV system belongs to and remains the property of the University. 4.2 The Control Rooms are supported by a digital recording system which stores images on appropriate media until capacity is reached and the images are then automatically overwritten. 4.3 Should it be decided that images be retained for any reason, including for release to a third party (including the Police) under the exemptions contained within sections 28(1), 29(1)(a) and (b) and/or 35(2)(a) of the Data Protection Act 1998, or retained for any reason for which the system is registered with the Information Commissioner, copies of those images may be transferred to an appropriate computer file. 4.4 Any file stored in line with above shall be given a unique reference number by the person creating the file and a record made in an image tracking register contained within the control room. 4.5 Unless required for any of the reasons contained within Section 29(3) of the Data protection Act 1968, recorded images will be retained for no longer than required for the purpose for which they were originally obtained, after that time the images are automatically overwritten by the recording equipment (currently 7 days) 4.6 Any recording medium will be cleaned before re-use to ensure that images are not recorded on top of images previously recorded. Access to Recordings by Staff or Third Parties 4.7 It is important that access to and disclosure of images is restricted and carefully controlled, not only to ensure that the rights of individuals are preserved but also to ensure that the chain of evidence remains intact should the images be required for evidential purposes. These aspects of the Code of Practice reflect the Second and Seventh Data Protection Principles of the Data Protection Act Access to recorded images will be restricted to security staff and those staff who require access, following the consent of the Security Manager, in order to achieve the purposes of using the equipment.

5 4.9 Requests by persons outside the University (other than the Police) for viewing or obtaining recordings will be assessed on a case by case basis by the Security Manager and access will only be granted where it is consistent with the obligations placed on the University by the Data Protection Act All requests for access will be recorded detailing the date and time at which access was allowed/or disclosure made; the reason for the access/disclosure; the extent of the information accessed/disclosed; name of the security staff providing access If access to images is denied to any member of staff or third party (including the Police), the Security Manager will document the reasons for the denial and the information will be logged at the Control Room Where it is decided by the Security Manager that the assistance of a member of University staff is needed to identify a victim, witness or perpetrator in relation to a criminal incident, images from the system may be circulated via the University s system to selected staff on a targeted basis, or placed on a suitably restricted area of the University s website. As part of that decision, the wishes of the victim of an incident will, where possible, be taken into account. Access by the Police 4.13 Where a police officer requests access to CCTV images either by viewing such data or requesting a copy of the data, the requisite form (held by Security) must be completed and signed Requests for access to images by the Police will not normally be denied and can be made without the authority of the Security Manager provided they are accompanied by a written request signed by a Police Officer, who must indicate that the images are required for the purposes of a specific crime enquiry. Access by Data Subjects 4.15 The University will comply with section 7 of the Data Protection Act 1998 in informing individuals whether or not information relating to them (in this case images) have been processed by the CCTV Surveillance System. The University is not obliged to comply with a request under this section unless it is supplied with such information as it may reasonably require to satisfy itself as to the identify of the person making the request and to locate the information which that person seeks Data Subjects may make a subject access request for CCTV images/recordings/information (request for data about themselves) by using the required form which is available from gp.html and must provide the following information: Dates and times of the incident or their visit to the University with details of the location on the NTU campus; two photographs one full face and one side view; proof of identity (e.g. driving licence/passport containing a photograph); Cheque or cash in the sum of 10.00; Whether they require copies or view of the images in question A written decision will be sent to the data subject within 21 days of receipt of the request. If access is agreed, such access will be provided within 40 days of

6 receipt of the request or, if later, on the date when the University receives confirmation of identification from the data subject Where the University is unable to comply with a subject access request without disclosing information relating to another individual who can be identified from that information, it is not obliged to comply with the request unless that individual has consented to the disclosure or it is reasonable, in the circumstances, to comply without the consent of the individual. 5. Complaints 5.1 Breaches of this Code by Security, Reception and other staff monitoring the system or who have access to the monitored images may constitute matters of discipline under the relevant conditions of employment. 5.2 It is also recognised that other members of the University may have concerns or complaints in respect to the operation of the CCTV Surveillance System. Any concerns or complaints should, in the first instance, be addressed to the Security Manager. 5.3 Concerns or queries relating to the Data Protection Principles in general should be directed to Legal Services. 6. Other Supporting Documents Corporate Guidelines on Data Protection. Enrolment Conditions for use of student data. 7. Governance Responsibility Policy Owner The Security & Operations Manager Version Control and Change History Version Approval Date Approved by Amendment Number 1.0 January 2009 New Policy 1.1 December 2009 Annual Review 2.0 June 2011 Revised Version Document Review The Policy and Procedure will be reviewed by the Security & Operations Manager in association with Legal Services, the trade unions, employee representatives (where appropriate) and managers in response to statutory changes, changes in University procedures or structures or as a result of the monitoring of the application of the procedure. In any event, the Policy and Procedure will be reviewed every two years.

CCTV PROCEDURES To support Information Security Policy Framework

CCTV PROCEDURES To support Information Security Policy Framework CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK

More information

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff

More information

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012 UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one

More information

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

Video surveillance policy (PUBLIC)

Video surveillance policy (PUBLIC) 29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security

More information

(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),

(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX (Police Force), DATE OF INFORMATION SHARING AGREEMENT JULY 2015 PARTIES (1) LIVE NATION (MUSIC) UK LIMITED (Company Number 02409911) whose registered office is at 2 nd Floor, Regent Arcade House, 19-25 Argyll Street,

More information

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO

LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles

More information

University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10

University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10 UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose

More information

Parliamentary Security Camera Policy

Parliamentary Security Camera Policy Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system

More information

University of Essex Automatic Number Plate Recognition (ANPR) Policy

University of Essex Automatic Number Plate Recognition (ANPR) Policy & Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them

More information

CCTV Cameras Policy. Policy Guidelines

CCTV Cameras Policy. Policy Guidelines CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy

More information

Photography and filming in schools Code of Practice

Photography and filming in schools Code of Practice Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data

More information

Policy for Management of CCTV on Waste Operation Vehicles

Policy for Management of CCTV on Waste Operation Vehicles Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for

More information

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice

Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement

University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the

More information

Quick guide to the employment practices code

Quick guide to the employment practices code Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment

More information

Data protection policy

Data protection policy Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction The Data Protection Act 1998 gives individuals the right to know what personal information is held about them. It provides a framework to ensure that the Office of the

More information

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

Police Officers who Commit Domestic Violence-Related Criminal Offences 1 PUBLIC DOCUMENT Association of Chief Police Officers of England, Wales and Northern Ireland Police Officers who Commit Domestic Violence-Related Criminal Offences 1 This is an ACPO policy relating to police

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

PS 172 Protective Monitoring Policy

PS 172 Protective Monitoring Policy PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;

More information

Human Resources and Data Protection

Human Resources and Data Protection Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

WEST MIDLANDS POLICE Force Policy Document

WEST MIDLANDS POLICE Force Policy Document WEST MIDLANDS POLICE Force Policy Document POLICY TITLE: POLICY REFERENCE NO: POLICE STAFF DISCIPLINARY PROCEDURE HR/06 Executive Summary The Force expects certain standards of conduct to be maintained

More information

Otley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date:

Otley Town Council. Disciplinary Policy. Date Approved: 17 th February 2014 Revision Date: Otley Town Council Disciplinary Policy Date Approved: 17 th February 2014 Revision Date: OTLEY TOWN COUNCIL DISCIPLINARY POLICY 1.0 Introduction 1.1 This policy is based on and complies with the 2009 ACAS

More information

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets

More information

MODESTO CITY SCHOOLS Administrative Regulation

MODESTO CITY SCHOOLS Administrative Regulation MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized

More information

technical factsheet 176

technical factsheet 176 technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

Policy C11 Staff Disciplinary Policy and Procedure

Policy C11 Staff Disciplinary Policy and Procedure Policy C11 Staff Disciplinary Policy and Procedure Providing a Clear Framework to Help Promote Good Employment Relations Disciplinary rules and procedures provide guidance to employees on the standards

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Records Retention and Disposal Schedule. Information Management

Records Retention and Disposal Schedule. Information Management Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,

More information

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

Criminal Justice (Scotland) Bill [AS INTRODUCED]

Criminal Justice (Scotland) Bill [AS INTRODUCED] Criminal Justice (Scotland) Bill [AS INTRODUCED] CONTENTS Section PART 1 ARREST AND CUSTODY CHAPTER 1 ARREST BY POLICE 1 Power of a constable 2 Exercise of the power Arrest without warrant Procedure following

More information

Floyd Healthcare Management, Inc. Notice of Privacy Practices

Floyd Healthcare Management, Inc. Notice of Privacy Practices Floyd Healthcare Management, Inc. Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

Children s Hearings (Scotland) Act 2011 2011 asp 1

Children s Hearings (Scotland) Act 2011 2011 asp 1 Children s Hearings (Scotland) Act 2011 (asp 1) Section Children s Hearings (Scotland) Act 2011 2011 asp 1 CONTENTS PART 1 THE NATIONAL CONVENER AND CHILDREN S HEARINGS SCOTLAND The National Convener and

More information

CODE OF PRACTICE 9. HMRC investigations where we suspect tax fraud

CODE OF PRACTICE 9. HMRC investigations where we suspect tax fraud CODE OF PRACTICE 9 HMRC investigations where we suspect tax fraud The HMRC Investigation of Fraud Statement (i) The Commissioners of HMRC reserve complete discretion to pursue a Criminal investigation

More information

Corporate Policy and Procedure

Corporate Policy and Procedure Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install

More information

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support

More information

FLEXIBLE WORKER GUIDELINES DISCIPLINARY PROCEDURES

FLEXIBLE WORKER GUIDELINES DISCIPLINARY PROCEDURES FLEXIBLE WORKER GUIDELINES DISCIPLINARY PROCEDURES NHS Professionals disciplinary guidelines for flexible workers July 2014 1 1. Scope These procedures are to be used for breaches of discipline or complaints

More information

ROYAL HOLLOWAY University of London. DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff)

ROYAL HOLLOWAY University of London. DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff) APPROVED BY COUNCIL September 2002 ROYAL HOLLOWAY University of London DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff) Disciplinary Policy and Procedure September 2002

More information

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

COBAR SHIRE COUNCIL FILE:P5-90

COBAR SHIRE COUNCIL FILE:P5-90 COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...

More information

Data Protection Act, 2005 - Summary Of Consequences

Data Protection Act, 2005 - Summary Of Consequences DATA PROTECTION ACT 1998 UNDERTAKING Data Controller: Caerphilly County Borough Council/ Cyngor Bwrdeistref Sirol Caerffili Penallta House Tredomen Park Ystradmynach Hengoed Mid Glamorgan CF82 7PG I, Chris

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection

More information

Domestic Violence, Dating Violence, and Stalking Policy Statement

Domestic Violence, Dating Violence, and Stalking Policy Statement Domestic Violence, Dating Violence, and Stalking Policy Statement Introduction The University of West Georgia is committed to providing a safe learning and working environment for all. In order to comply

More information

Video surveillance at EFSA Implementing rules and technical specifications

Video surveillance at EFSA Implementing rules and technical specifications Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings,

More information

GUIDANCE FOR EMPLOYED BARRISTERS. Part 1. General

GUIDANCE FOR EMPLOYED BARRISTERS. Part 1. General GUIDANCE FOR EMPLOYED BARRISTERS Part 1. General 1.1 This guidance has been issued by the Professional Standards Committee, the Professional Conduct and Complaints Committee and the Employed Barristers

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY

BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY BOROUGHBRIDGE TOWN COUNCIL S DISCIPLINARY AND GRIEVANCE POLICY 1 HALL SQUARE, BOROUGHBRIDGE, NORTH YORKSHIRE, YO51 9AN www.boroughbridge.org.uk [email protected] Tel: 01423 322956 BOROUGHBRIDGE

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Data Protection Policy June 2014

Data Protection Policy June 2014 Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:

More information

High Peak CVS Disciplinary Policy and Procedure

High Peak CVS Disciplinary Policy and Procedure High Peak CVS Disciplinary Policy and Procedure The effectiveness and credibility of HIGH PEAK CVS and its employees is dependent to a large extent on the ability to achieve and preserve high standards

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3

More information

[EMPLOYERS NAME AND ADDRESS]

[EMPLOYERS NAME AND ADDRESS] THIS CONTRACT HAS BEEN PROVIDED BY WITHY KING SOLICITORS FOR MEMBERS OF ANA THIS IS FOR GUIDANCE ONLY. IS YOUR RESPONSIBILITY TO ENSURE ITS LEGAL CONTENT. Contracts Drawing up a contract at the beginning

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Standards, Performance and Attendance Policy

Standards, Performance and Attendance Policy Standards, Performance and Attendance Policy 1. Purpose Monitor s Standards, Performance and Attendance Policy (the Policy) describes the standard of conduct required of people working for Monitor on and/or

More information

DATA PROTECTION AUDIT GUIDANCE

DATA PROTECTION AUDIT GUIDANCE DATA PROTECTION AUDIT GUIDANCE CONTENTS Section I: Section II: Audit of Processing of Personal Data Audit Procedure Appendices: A B C D E Audit Form List of Purposes List of data subjects List of data

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure Providing a Clear Framework to Help Promote Good Employment Relations Disciplinary rules and procedures provide guidance to employees on the standards and conduct expected

More information

Disclosing Information - The Data Protection Act, 2002

Disclosing Information - The Data Protection Act, 2002 Disclosing information to prevent or detect crime the section 25 exemption This guidance note explains what you need to consider when you are requested to disclose personal information to assist in the

More information

Connecticut Carpenters Health Fund Privacy Notice

Connecticut Carpenters Health Fund Privacy Notice Connecticut Carpenters Health Fund Privacy Notice THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

Do you have a private life at your workplace?

Do you have a private life at your workplace? Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on

More information

Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930

Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Security Classification: NOT PROTECTIVELY MARKED Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Association of Chief

More information

SDC-League Health Fund

SDC-League Health Fund SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: [email protected] NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION

More information

Surveillance Camera Code of Practice. June 2013

Surveillance Camera Code of Practice. June 2013 Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery

More information

8 July 2015 CRIMINAL JUSTICE (Victims of Crime) BILL 2015 GENERAL SCHEME CONTENTS PART 1 PRELIMINARY. PART 2 Information for Victims

8 July 2015 CRIMINAL JUSTICE (Victims of Crime) BILL 2015 GENERAL SCHEME CONTENTS PART 1 PRELIMINARY. PART 2 Information for Victims 1 P a g e 8 July version Preamble Head 8 July 2015 CRIMINAL JUSTICE (Victims of Crime) BILL 2015 GENERAL SCHEME 1. Short title and commencement 2. Interpretation 3. Expenses CONTENTS PART 1 PRELIMINARY

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Data Protection Policy

Data Protection Policy Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure Policy The success of the University is dependent on its most important resource, its staff. It is therefore vital that all employees are encouraged to work to the best

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

SCHEDULE 18. Premises. This Schedule 18 sets out certain terms relating to the Service Provider s Premises.

SCHEDULE 18. Premises. This Schedule 18 sets out certain terms relating to the Service Provider s Premises. Business Operations- Schedule 18 (Premises) SCHEDULE 18 Premises This Schedule 18 sets out certain terms relating to the Service Provider s Premises. 1. Service Provider's Premises The following provisions

More information

LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT

LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT Law-enforcement agencies in Virginia continue to enjoy one of the broadest exemptions for releasing information in all of the states. The Virginia

More information

Physical Security Policy

Physical Security Policy London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical

More information

Access to Health Records

Access to Health Records Access to Health Records Crown Heights Medical Centre Procedure Access to Health Records ACCESS TO MEDICAL RECORDS (DATA PROTECTION) POLICY INTRODUCTION The Access to Health Records Act 1990 gave individuals

More information

SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE

SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten

More information